General

  • Target

    WizWormUPDATE.exe

  • Size

    37.7MB

  • Sample

    250325-z959fasyct

  • MD5

    db0969723ce55d07ab0931a320411ce1

  • SHA1

    d89183adedd94cfba95c0cf619d004d94158849d

  • SHA256

    fa796ccbdb277c07688707b0c3cd6fe44848d77e25cadce285d03c45a6e32f37

  • SHA512

    b0c48339444d2f52489a42779045b72c69c722a9fde79932016345160a715a1d5e7482ce02c4b8506a8645ae4507ed6c17864f4d74e8d87e2810ff76bbeff08d

  • SSDEEP

    786432:drSR8JgzXVQBpoXSHl2gHHeQ7pEHe2RwSU7QvYppG9fJU0a1uzXE26Ef/:d2brV0pHHHe6EHe2uXAYpcfa1uV/

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:5552

Mutex

OBV89v4uzmGcZD3l

Attributes
  • Install_directory

    %Temp%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/D2tS0Xe2

aes.plain
aes.plain

Targets

    • Target

      WizWormUPDATE.exe

    • Size

      37.7MB

    • MD5

      db0969723ce55d07ab0931a320411ce1

    • SHA1

      d89183adedd94cfba95c0cf619d004d94158849d

    • SHA256

      fa796ccbdb277c07688707b0c3cd6fe44848d77e25cadce285d03c45a6e32f37

    • SHA512

      b0c48339444d2f52489a42779045b72c69c722a9fde79932016345160a715a1d5e7482ce02c4b8506a8645ae4507ed6c17864f4d74e8d87e2810ff76bbeff08d

    • SSDEEP

      786432:drSR8JgzXVQBpoXSHl2gHHeQ7pEHe2RwSU7QvYppG9fJU0a1uzXE26Ef/:d2brV0pHHHe6EHe2uXAYpcfa1uV/

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Chaos family

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks